CN117235406A - Information content security management and control method and device based on block chain - Google Patents

Information content security management and control method and device based on block chain Download PDF

Info

Publication number
CN117235406A
CN117235406A CN202311507363.XA CN202311507363A CN117235406A CN 117235406 A CN117235406 A CN 117235406A CN 202311507363 A CN202311507363 A CN 202311507363A CN 117235406 A CN117235406 A CN 117235406A
Authority
CN
China
Prior art keywords
information
condition
distributed
sensitive
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311507363.XA
Other languages
Chinese (zh)
Other versions
CN117235406B (en
Inventor
吕锐
吴宏武
陈子钢
刘义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Planning and Designing Institute of Telecommunications Co Ltd
Original Assignee
Guangdong Planning and Designing Institute of Telecommunications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Planning and Designing Institute of Telecommunications Co Ltd filed Critical Guangdong Planning and Designing Institute of Telecommunications Co Ltd
Priority to CN202311507363.XA priority Critical patent/CN117235406B/en
Publication of CN117235406A publication Critical patent/CN117235406A/en
Application granted granted Critical
Publication of CN117235406B publication Critical patent/CN117235406B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a control method and a device for information content security based on a blockchain, wherein the method comprises the following steps: acquiring information to be distributed which needs to be controlled, and determining information parameters of the information to be distributed; determining a detection mode corresponding to the information to be released according to the information parameters; detecting sensitive information in the information to be released according to the detection mode, and executing matched auditing operation on the information to be released according to the information type of the sensitive information to obtain an auditing result of the information to be released; and executing corresponding control operation on the information to be released according to the auditing result. Therefore, the method and the device can automatically detect the sensitive information in the information to be released, and audit the information to be released aiming at the sensitive information so as to realize automatic management and control of the information to be released, thus being beneficial to improving the audit efficiency of the information to be released, further being beneficial to improving the management and control efficiency of the information to be released, and further being beneficial to timely releasing the information to be released, blocking the release and other management and control operations.

Description

Information content security management and control method and device based on block chain
Technical Field
The invention relates to the technical field of Internet, in particular to a block chain-based information content security management and control method and device.
Background
With the rapid development of the internet, contents presented by internet information are more and more diversified. In order to provide a green and safe internet environment, before the internet information is released, the internet information to be released is required to be checked, managed and controlled, so that the safety and the legality of the released internet information are ensured.
At present, a multi-person alternate auditing mode is generally adopted for the management and control mode of the internet information to be released, each internet information to be released is subjected to multi-round auditing, and then a plurality of auditing results are synthesized to determine whether each internet information belongs to a release type or a non-release type, however, the auditing flow of the internet information is too complicated, the management and control efficiency of the internet information is not improved, and the release timeliness of the internet information is affected. It is important to provide a method for improving the management and control efficiency of internet information.
Disclosure of Invention
The technical problem to be solved by the invention is to provide the block chain-based information content security management and control method and device, which are beneficial to improving the auditing efficiency of the information to be released, further beneficial to improving the management and control efficiency of the information to be released, and further beneficial to timely releasing the information to be released, blocking the management and control operation of releasing and the like.
In order to solve the technical problem, the first aspect of the present invention discloses a method for controlling information content security based on blockchain, which comprises the following steps:
acquiring information to be distributed which needs to be controlled, and determining information parameters of the information to be distributed; the information parameters of the information to be distributed comprise at least one of information type parameters, information content parameters, distribution platform type parameters and distribution position parameters of the information to be distributed;
determining a detection mode corresponding to the information to be distributed according to the information parameters; the detection mode comprises at least one of a text detection mode, an image detection mode, an audio detection mode, a video detection mode and a position parameter detection mode;
detecting sensitive information in the information to be distributed according to the detection mode, and executing matched auditing operation on the information to be distributed according to the information type of the sensitive information to obtain an auditing result of the information to be distributed;
according to the auditing result, corresponding management and control operation is executed on the information to be issued; the managing operation includes one of a permit publication operation, a block publication operation, and a withdraw publication operation.
In an optional implementation manner, in a first aspect of the present invention, the performing, according to the information type of the sensitive information, a matched auditing operation on the information to be distributed to obtain an auditing result of the information to be distributed includes:
determining scene information of an information generation scene of the information to be distributed, and determining scene privacy degree of the information generation scene according to the scene information of the information generation scene; the scene information comprises at least one of scene position information, scene personnel activity information and scene type information;
determining user information of a publisher of the information to be published, and determining information publishing authority parameters of the publisher in the information generating scene according to the user information of the publisher and the scene privacy degree of the information generating scene;
and according to the information release authority parameters corresponding to the publisher and the information type of the sensitive information, performing matched auditing operation on the information to be released to obtain an auditing result of the information to be released.
In an optional implementation manner, in a first aspect of the present invention, according to the information distribution authority parameter corresponding to the publisher and the information type of the sensitive information, performing a matched auditing operation on the information to be distributed to obtain an auditing result of the information to be distributed, where the auditing result includes:
According to the information release authority parameters corresponding to the publisher, performing release condition auditing operation on the information to be released, and obtaining release condition auditing results of the information to be released as first auditing results of the information to be released;
judging whether the sensitive information has an information hiding object corresponding to the information type according to the information type of the sensitive information; the information hiding object comprises at least one of a visual information hiding object, an auditory information hiding object and a position parameter hiding object;
when judging that the sensitive information does not have the information hiding object, determining a target sensitive information comparison library matched with the information type from a plurality of preset sensitive information comparison libraries according to the information type of the sensitive information;
determining an abnormal sensitivity degree value corresponding to the sensitive information according to the target sensitive information comparison library, and taking the abnormal sensitivity degree value as a second checking result of the information to be issued;
and determining the auditing result of the information to be distributed according to the first auditing result and the second auditing result.
As an alternative embodiment, in the first aspect of the present invention, the method further includes:
When the sensitive information is judged to exist in the information hiding object, determining target parameters of the information hiding object; the target parameters of the information hiding object comprise at least one of an information hiding position parameter, an information hiding area size parameter, an information hiding degree parameter and an information hiding duration parameter of the information hiding object;
according to the target parameters of the information hiding object, predicting the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object, and determining the influence degree value corresponding to the influence condition according to the influence condition to be used as a third verification result of the information to be distributed; the target object corresponding to the information to be distributed comprises a distributor or a receiver of the information to be distributed;
and determining the auditing result of the information to be distributed according to the first auditing result and the third auditing result.
As an optional implementation manner, in the first aspect of the present invention, the information type of the sensitive information includes at least one of a text information type, an image information type, an audio information type, a video information type, and a location parameter type;
And predicting the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object according to the target parameter of the information hiding object, wherein the method comprises the following steps:
when the information type of the sensitive information comprises at least one of the text information type, the image information type and the video information type, determining a visual information hiding condition of the sensitive information according to a target parameter of the information hiding object, and predicting a first information receiving condition of a receiver corresponding to the information to be sent for the sensitive information according to the visual information hiding condition; the first information receiving condition comprises at least one of a first information receiving amount condition, a first information receiving definition condition and a first information receiving content condition;
according to the first information receiving condition, determining a first influence condition of the first information receiving condition on the receiver as an influence condition of the sensitive information on a target object corresponding to the information to be distributed under the information hiding object; the first impact condition includes at least one of a first physiological impact condition, and a first activity impact condition.
As an alternative embodiment, in the first aspect of the present invention, the method further includes:
when the information type of the sensitive information comprises the audio information type, determining the acoustic information hiding condition of the sensitive information according to the target parameter of the information hiding object, and predicting the second information receiving condition of the receiver corresponding to the information to be distributed for the sensitive information according to the acoustic information hiding condition; the second information receiving condition comprises at least one of a second information receiving amount condition, a second information receiving definition condition and a second information receiving content condition;
determining a second influence condition of the second information receiving condition on the receiver according to the second information receiving condition, wherein the second influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object; the second influence condition includes at least one of a second physiological influence condition, and a second activity influence condition.
As an alternative embodiment, in the first aspect of the present invention, the method further includes:
When the information type of the sensitive information comprises the position parameter type, determining a position parameter hiding condition of the sensitive information according to a target parameter of the information hiding object, and predicting a position parameter receiving condition of a receiver corresponding to the information to be distributed aiming at the sensitive information according to the position parameter hiding condition; the position parameter receiving condition comprises a position parameter receiving degree condition;
and determining the position tracing condition of the receiver corresponding to the information to be distributed on the publisher of the information to be distributed according to the position parameter receiving condition, and determining the privacy influence condition caused by the position tracing condition on the publisher according to the position tracing condition, wherein the privacy influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object.
The second aspect of the invention discloses a control device for information content security based on a blockchain, which comprises:
the acquisition module is used for acquiring information to be distributed which needs to be controlled;
the first determining module is used for determining information parameters of the information to be distributed; the information parameters of the information to be distributed comprise at least one of information type parameters, information content parameters, distribution platform type parameters and distribution position parameters of the information to be distributed; determining a detection mode corresponding to the information to be distributed according to the information parameters; the detection mode comprises at least one of a text detection mode, an image detection mode, an audio detection mode, a video detection mode and a position parameter detection mode;
The detection module is used for detecting sensitive information in the information to be distributed according to the detection mode;
the second determining module is used for executing matched auditing operation on the information to be issued according to the information type of the sensitive information to obtain an auditing result of the information to be issued;
the management and control module is used for executing corresponding management and control operation on the information to be distributed according to the auditing result; the managing operation includes one of a permit publication operation, a block publication operation, and a withdraw publication operation.
In a second aspect of the present invention, the second determining module performs a matched auditing operation on the information to be distributed according to the information type of the sensitive information, and the manner of obtaining the auditing result of the information to be distributed specifically includes:
determining scene information of an information generation scene of the information to be distributed, and determining scene privacy degree of the information generation scene according to the scene information of the information generation scene; the scene information comprises at least one of scene position information, scene personnel activity information and scene type information;
Determining user information of a publisher of the information to be published, and determining information publishing authority parameters of the publisher in the information generating scene according to the user information of the publisher and the scene privacy degree of the information generating scene;
and according to the information release authority parameters corresponding to the publisher and the information type of the sensitive information, performing matched auditing operation on the information to be released to obtain an auditing result of the information to be released.
In a second aspect of the present invention, the second determining module performs a matched auditing operation on the information to be distributed according to the information distribution authority parameter corresponding to the distributor and the information type of the sensitive information, and the manner of obtaining the auditing result of the information to be distributed specifically includes:
according to the information release authority parameters corresponding to the publisher, performing release condition auditing operation on the information to be released, and obtaining release condition auditing results of the information to be released as first auditing results of the information to be released;
judging whether the sensitive information has an information hiding object corresponding to the information type according to the information type of the sensitive information; the information hiding object comprises at least one of a visual information hiding object, an auditory information hiding object and a position parameter hiding object;
When judging that the sensitive information does not have the information hiding object, determining a target sensitive information comparison library matched with the information type from a plurality of preset sensitive information comparison libraries according to the information type of the sensitive information;
determining an abnormal sensitivity degree value corresponding to the sensitive information according to the target sensitive information comparison library, and taking the abnormal sensitivity degree value as a second checking result of the information to be issued;
and determining the auditing result of the information to be distributed according to the first auditing result and the second auditing result.
In a second aspect of the present invention, the method for obtaining the auditing result of the information to be distributed by the second determining module according to the information distribution authority parameter corresponding to the distributor and the information type of the sensitive information and performing the matched auditing operation on the information to be distributed specifically further includes:
when the sensitive information is judged to exist in the information hiding object, determining target parameters of the information hiding object; the target parameters of the information hiding object comprise at least one of an information hiding position parameter, an information hiding area size parameter, an information hiding degree parameter and an information hiding duration parameter of the information hiding object;
According to the target parameters of the information hiding object, predicting the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object, and determining the influence degree value corresponding to the influence condition according to the influence condition to be used as a third verification result of the information to be distributed; the target object corresponding to the information to be distributed comprises a distributor or a receiver of the information to be distributed;
and determining the auditing result of the information to be distributed according to the first auditing result and the third auditing result.
As an optional implementation manner, in the second aspect of the present invention, the information type of the sensitive information includes at least one of a text information type, an image information type, an audio information type, a video information type, and a location parameter type;
the second determining module predicts, according to the target parameter of the information hiding object, an influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object, where the method specifically includes:
when the information type of the sensitive information comprises at least one of the text information type, the image information type and the video information type, determining a visual information hiding condition of the sensitive information according to a target parameter of the information hiding object, and predicting a first information receiving condition of a receiver corresponding to the information to be sent for the sensitive information according to the visual information hiding condition; the first information receiving condition comprises at least one of a first information receiving amount condition, a first information receiving definition condition and a first information receiving content condition;
According to the first information receiving condition, determining a first influence condition of the first information receiving condition on the receiver as an influence condition of the sensitive information on a target object corresponding to the information to be distributed under the information hiding object; the first impact condition includes at least one of a first physiological impact condition, and a first activity impact condition.
In a second aspect of the present invention, the method for predicting, according to the target parameter of the information hiding object, an influence of the sensitive information on the target object corresponding to the information to be sent under the information hiding object specifically further includes:
when the information type of the sensitive information comprises the audio information type, determining the acoustic information hiding condition of the sensitive information according to the target parameter of the information hiding object, and predicting the second information receiving condition of the receiver corresponding to the information to be distributed for the sensitive information according to the acoustic information hiding condition; the second information receiving condition comprises at least one of a second information receiving amount condition, a second information receiving definition condition and a second information receiving content condition;
Determining a second influence condition of the second information receiving condition on the receiver according to the second information receiving condition, wherein the second influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object; the second influence condition includes at least one of a second physiological influence condition, and a second activity influence condition.
In a second aspect of the present invention, the method for predicting, according to the target parameter of the information hiding object, an influence of the sensitive information on the target object corresponding to the information to be sent under the information hiding object specifically further includes:
when the information type of the sensitive information comprises the position parameter type, determining a position parameter hiding condition of the sensitive information according to a target parameter of the information hiding object, and predicting a position parameter receiving condition of a receiver corresponding to the information to be distributed aiming at the sensitive information according to the position parameter hiding condition; the position parameter receiving condition comprises a position parameter receiving degree condition;
And determining the position tracing condition of the receiver corresponding to the information to be distributed on the publisher of the information to be distributed according to the position parameter receiving condition, and determining the privacy influence condition caused by the position tracing condition on the publisher according to the position tracing condition, wherein the privacy influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object.
In a third aspect, the present invention discloses another blockchain-based information content security management and control device, which includes:
a memory storing executable program code;
a processor coupled to the memory;
the processor invokes the executable program code stored in the memory to execute the blockchain-based information content security management and control method disclosed in the first aspect of the present invention.
A fourth aspect of the present invention discloses a computer storage medium storing computer instructions that, when invoked, are operable to perform the blockchain-based information content security management method disclosed in the first aspect of the present invention.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
In the embodiment of the invention, the information to be distributed which needs to be controlled is obtained, and the information parameters of the information to be distributed are determined; determining a detection mode corresponding to the information to be released according to the information parameters; detecting sensitive information in the information to be released according to the detection mode, and executing matched auditing operation on the information to be released according to the information type of the sensitive information to obtain an auditing result of the information to be released; and executing corresponding control operation on the information to be released according to the auditing result. Therefore, the method and the device can automatically detect the sensitive information in the information to be released, and audit the information to be released aiming at the sensitive information so as to realize automatic management and control of the information to be released, thus being beneficial to improving the audit efficiency of the information to be released, further being beneficial to improving the management and control efficiency of the information to be released, and further being beneficial to timely releasing the information to be released, blocking the release and other management and control operations.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for controlling information content security based on blockchain according to an embodiment of the present invention;
FIG. 2 is a flow chart of another method for controlling information content security based on blockchain in accordance with the embodiments of the present invention;
FIG. 3 is a schematic diagram of a control device for controlling information content security based on blockchain according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another control device for controlling information content security based on blockchain according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first, second and the like in the description and in the claims and in the above-described figures are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, apparatus, article, or article that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or article.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The invention discloses a block chain-based information content security management and control method and device, which are beneficial to improving the auditing efficiency of information to be released, and further beneficial to improving the management and control efficiency of the information to be released, so that the management and control operations such as timely releasing, blocking releasing and the like of the information to be released are facilitated.
Example 1
Referring to fig. 1, fig. 1 is a flow chart of a control method for controlling information content security based on blockchain according to an embodiment of the present invention. The blockchain-based information content security management and control method described in fig. 1 may be applied to audit information to be distributed uploaded by various information distribution platforms, such as a self-media platform, a third-party media platform, and the like, and the embodiment of the invention is not limited. Optionally, the method may be implemented by a blockchain information auditing system, where the blockchain information auditing system may be integrated in a blockchain information auditing device, or may be a local server or cloud server that is used to process a blockchain information auditing procedure, and the embodiment of the present invention is not limited. As shown in fig. 1, the blockchain-based information content security management method may include the following operations:
101. And acquiring information to be distributed which needs to be controlled, and determining information parameters of the information to be distributed.
In the embodiment of the present invention, optionally, the information parameters of the information to be published include at least one of information type parameters (such as information type, science popularization type, evaluation type, etc.), information content parameters, publishing platform type parameters (such as self-media platform, third-party media platform, etc.), and publishing location parameters (such as published IP address, entity geographic address, etc.).
102. And determining a detection mode corresponding to the information to be released according to the information parameters.
In the embodiment of the present invention, optionally, the detection mode includes at least one of a text detection mode, an image detection mode, an audio detection mode, a video detection mode, and a position parameter detection mode.
Further, the text detection mode can be understood as that the keyword analysis is performed after the disambiguation treatment such as noise cleaning, complex conversion and the like is performed on the text content; the image detection mode can be understood as analyzing the image format of the main stream, and realizing detection and analysis of subsequent gallery comparison, OCR, sensitive information recognition and the like; the audio detection mode can be understood as a technology for analyzing a main stream audio file, identifying the collected audio as a text, and detecting the text content; the video detection mode can be understood as analyzing the main stream video file, and based on the analysis indexing technology of the content characteristics, the intelligent classification, recognition and analysis of texts, graphics and the like are realized on the extracted information by extracting the information such as metadata, embedded subtitles, video key frames and the like; the location parameter detection mode can be understood as detecting the IP address and the geographic location of the entity through network traffic monitoring, IP address tracking tools, access log analysis, a geographic positioning system and the like; and may additionally include dark chain detection techniques such as multi-dimensional multi-feature (page source code, iframe frame detection, js jump address domain name home resolution, etc.) analysis of links in the published content.
103. And detecting sensitive information in the information to be released according to the detection mode, and executing matched auditing operation on the information to be released according to the information type of the sensitive information to obtain an auditing result of the information to be released.
In an embodiment of the present invention, optionally, the information type of the sensitive information includes at least one of a text information type, an image information type, an audio information type, a video information type, and a location parameter type. Further alternatively, the auditing result of the information to be published may include, for example, that the abnormal sensitivity level of the sensitive information has not reached the level threshold, that the publication is allowed, that the abnormal sensitivity level of the sensitive information has exceeded the level threshold, that the abnormal sensitivity level of the sensitive information has not been allowed to exceed the level threshold, that the publication needs to be withdrawn, and so on.
104. And executing corresponding control operation on the information to be released according to the auditing result.
In an embodiment of the present invention, the managing operation includes one of a permit release operation, a block release operation, and a withdraw release operation. Further, when the blocking release operation or the withdrawal release operation is performed on the information to be released, the abnormal warning information can be pushed to the publisher/third party media platform/self media platform and the like through a short message, a mailbox, an APP, a platform and the like.
Therefore, the embodiment of the invention can automatically detect the sensitive information in the information to be released, and audit the information to be released aiming at the sensitive information so as to realize the automatic management and control of the information to be released, thus being beneficial to improving the audit efficiency of the information to be released, further being beneficial to improving the management and control efficiency of the information to be released, and further being beneficial to timely releasing the information to be released, blocking the release and other management and control operations.
Example two
Referring to fig. 2, fig. 2 is a flow chart of another method for controlling information content security based on blockchain according to an embodiment of the present invention. The blockchain-based information content security management and control method described in fig. 2 may be applied to audit information to be distributed uploaded by various information distribution platforms, such as a self-media platform, a third-party media platform, and the like, and the embodiment of the invention is not limited. Optionally, the method may be implemented by a blockchain information auditing system, where the blockchain information auditing system may be integrated in a blockchain information auditing device, or may be a local server or cloud server that is used to process a blockchain information auditing procedure, and the embodiment of the present invention is not limited. As shown in fig. 2, the blockchain-based information content security management method may include the following operations:
201. And acquiring information to be distributed which needs to be controlled, and determining information parameters of the information to be distributed.
202. And determining a detection mode corresponding to the information to be released according to the information parameters.
203. Detecting sensitive information in the information to be released according to the detection mode; determining scene information of an information generation scene of information to be distributed, and determining the scene privacy degree of the information generation scene according to the scene information of the information generation scene.
In the embodiment of the invention, the information generation scene of the information to be distributed can be understood as a shooting scene, a radio scene, an information editing scene and the like corresponding to the information to be distributed. Optionally, the scene information includes at least one of scene location information, scene person activity information, and scene type information. Further, determining the scene privacy degree of the information generation scene according to the scene information of the information generation scene can be understood as that the scene privacy degree of the information generation scene can be determined to be higher if the activity information of important characters is involved in the video to be distributed; when only daily life recording information of a publisher individual is involved in the video to be published, it can be determined that the scene privacy degree of the information generation scene is low, and the like.
204. User information of a publisher of information to be published is determined, and information publishing authority parameters of the publisher in the information generation scene are determined according to the user information of the publisher and the scene privacy degree of the information generation scene.
In the embodiment of the present invention, optionally, the user information of the publisher may include user type information, user age information, user historical publishing conditions, user level information, user identity confidence information, and so on. Further optionally, after the user requests verification through password authentication, mobile phone number authentication, mailbox authentication and the like and the verification is successful, public-private key signature is performed, and then user information of the publisher of the information to be published is obtained.
205. And executing matched auditing operation on the information to be released according to the information release authority parameters corresponding to the publisher and the information type of the sensitive information to obtain an auditing result of the information to be released.
In the embodiment of the invention, the matched auditing operation is performed on the information to be released, which can be understood as being performed in two parts, namely, the auditing operation is performed on the information to be released based on the information release authority parameters corresponding to the publisher, and the judging operation is performed on the information abnormal sensitivity degree of the information to be released based on the information type of the sensitive information.
206. And executing corresponding control operation on the information to be released according to the auditing result.
In the embodiment of the present invention, for other descriptions of step 201, step 202 and step 206, please refer to the detailed descriptions of step 101, step 102 and step 104 in the first embodiment, and the detailed descriptions of the embodiment of the present invention are omitted.
Therefore, the embodiment of the invention can determine the information release authority parameters corresponding to the publishers according to the scene information of the information to be released and the user information of the publishers, and then combine the information release authority parameters corresponding to the publishers with the information types of the sensitive information to carry out the auditing operation on the information to be released, so that the information to be released can be audited in an all-around manner, the auditing reliability and accuracy of the information to be released can be improved, the matching of the released information and the release authority of the publishers can be ensured, and the abnormal sensitivity value of the sensitive information is still in a normal range.
In an optional embodiment, in step 205, according to the information release authority parameter corresponding to the publisher and the information type of the sensitive information, performing a matched auditing operation on the information to be released to obtain an auditing result of the information to be released, including:
According to the information release authority parameters corresponding to the publisher, executing release condition auditing operation on the information to be released to obtain release condition auditing results of the information to be released, and taking the results as first auditing results of the information to be released;
judging whether the sensitive information has an information hiding object corresponding to the information type according to the information type of the sensitive information;
when judging that the sensitive information does not have an information hiding object, determining a target sensitive information comparison library matched with the information type from a plurality of preset sensitive information comparison libraries according to the information type of the sensitive information;
determining an abnormal sensitivity degree value corresponding to the sensitive information according to the target sensitive information comparison library, and taking the abnormal sensitivity degree value as a second checking result of the information to be issued;
and determining an audit result of the information to be released according to the first audit result and the second audit result.
In this alternative embodiment, the information hiding objects optionally include at least one of visual information hiding objects (e.g., mosaicing, adding extra maps, etc.), auditory information hiding objects (e.g., sound noise adding, changing tone patterns, etc.), and location parameter hiding objects (virtual IP positioning employed, virtual geographic location, etc.). Further optionally, the information type of the sensitive information includes at least one of a text information type, an image information type, an audio information type, a video information type, and a location parameter type. Furthermore, the comparison data of the sensitive information comparison library can be obtained by storing the checked sensitive information with the abnormal sensitivity value exceeding the threshold value, namely the abnormal sensitive storage content can be understood, so that the comparison data in the sensitive information comparison library is continuously enriched, and the reliability of the subsequent judgment of the abnormal sensitivity value of the sensitive information is improved. Still further, the determination of the abnormal sensitivity level of the sensitive information may be understood as the similarity between the abnormal sensitivity level and the comparison data in the target sensitive information comparison library, wherein the higher the similarity is, the higher the abnormal sensitivity level of the sensitive information is, otherwise, the opposite is.
Therefore, the second checking result of the information to be released can be obtained by directly comparing the sensitive information with the target sensitive information comparison library when the sensitive information does not have the information hiding object corresponding to the information type, so that the flexibility of checking operation of the sensitive information is reflected, and the reliability and accuracy of the comparison of the sensitive information can be improved by the comparison operation with the sensitive information comparison library, so that the reliability and accuracy of the obtained checking result of the sensitive information can be improved.
In another alternative embodiment, the method further comprises:
when judging that the sensitive information exists in the information hiding object, determining target parameters of the information hiding object;
according to the target parameters of the information hiding object, predicting the influence condition of the sensitive information caused by the target object corresponding to the information to be released under the information hiding object, and determining the influence degree value corresponding to the influence condition according to the influence condition to be used as a third checking result of the information to be released;
and determining an audit result of the information to be released according to the first audit result and the third audit result.
In this optional embodiment, optionally, the target parameter of the information hiding object includes at least one of an information hiding position parameter, an information hiding area size parameter, an information hiding degree parameter, and an information hiding duration parameter (such as a duration of time that the mosaic appears in the video) of the information hiding object. Further, the target object corresponding to the information to be distributed includes a distributor or a receiver of the information to be distributed. For example, when a video area in the video to be distributed is marked with a mosaic, the receiving condition of the video to be distributed can be determined by combining the size, the appearance position, etc. of the mosaic, so as to further determine whether the content of the video to be distributed will have adverse effects on the psychological condition of the receiver under the action of the mosaic, etc.
Therefore, according to the alternative embodiment, under the condition that the sensitive information has the corresponding information hiding object, the influence condition of the sensitive information on the target object of the information to be issued is predicted based on the target parameter of the information hiding object, and then the abnormal sensitivity degree judgment result of the information to be issued is obtained, so that the information hiding object is combined for analysis, the intellectualization and the comprehensiveness of the abnormal sensitivity degree judgment operation of the sensitive information are reflected, the reliability and the accuracy of the abnormal sensitivity degree judgment of the sensitive information are improved, and the information issuing safety of the whole information to be issued is improved.
In yet another alternative embodiment, predicting an influence of sensitive information on a target object corresponding to information to be published under the information hiding object according to a target parameter of the information hiding object includes:
when the information type of the sensitive information comprises at least one of a text information type, an image information type and a video information type, determining a visual information hiding condition of the sensitive information according to a target parameter of an information hiding object, and predicting a first information receiving condition of a receiver corresponding to the information to be released aiming at the sensitive information according to the visual information hiding condition;
And determining a first influence condition caused by the first information receiving condition on the receiver according to the first information receiving condition, wherein the first influence condition is used as the influence condition caused by the sensitive information to be published corresponding to the target object under the information hiding object.
In this optional embodiment, optionally, the first information reception condition includes at least one of a first information reception amount condition, a first information reception sharpness condition, and a first information reception content condition. Further optionally, the first influencing situation includes at least one of a first physiological influencing situation, and a first activity influencing situation, such as if the receiver receives the mosaic video to be distributed, psychological or physiological discomfort may still exist, such as acceleration of heartbeat, regurgitation, vomiting, palpitation, and the like.
Further, as an optional embodiment, the method further includes:
when the information type of the sensitive information comprises an audio information type, determining the acoustic information hiding condition of the sensitive information according to the target parameter of the information hiding object, and predicting the second information receiving condition of a receiver corresponding to the information to be released aiming at the sensitive information according to the acoustic information hiding condition;
And determining a second influence condition of the second information receiving condition on the receiver according to the second information receiving condition, wherein the second influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be released under the information hiding object.
In this optional embodiment, optionally, the second information reception condition includes at least one of a second information reception amount condition, a second information reception sharpness condition, and a second information reception content condition. Further optionally, the second influencing situation comprises at least one of a second physiological influencing situation, and a second activity influencing situation. For example, when a certain audio region in the audio to be distributed has been subjected to tone color processing, the receiving condition of the audio to be distributed may be determined by the receiver according to the processing degree (e.g. who the speaker is can not be recognized), the occupied processing time length, etc., so as to further determine whether the content of the audio to be distributed will have adverse effect on the psychological condition of the receiver under the effect of tone color processing, etc.
Still further, as an alternative embodiment, the method further comprises:
when the information type of the sensitive information comprises a position parameter type, determining a position parameter hiding condition of the sensitive information according to a target parameter of an information hiding object, and predicting a position parameter receiving condition of a receiver corresponding to the information to be released aiming at the sensitive information according to the position parameter hiding condition;
According to the position parameter receiving condition, determining the position tracing condition of the publisher of the information to be published, corresponding to the information to be published, of the receiver, and according to the position tracing condition, determining the privacy influence condition of the position tracing condition on the publisher, wherein the privacy influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be published under the information hiding object.
In this alternative embodiment, wherein the location parameter reception condition comprises a location parameter reception degree condition. For example, when the position parameter in the video to be distributed has been subjected to the virtual hiding process, the receiving degree of the position parameter of the distributor can be determined by combining the processing degree of the virtual hiding process (if the true position of the distributor cannot be tracked), so as to further predict the degree to which the true position of the distributor can be tracked by the receiver, thereby determining the negative influence on the privacy condition of the distributor, and the like.
Therefore, the optional embodiment can analyze the determined visual information hiding condition, the acoustic information hiding condition and the position parameter hiding condition of the sensitive information respectively, then predict the first influence condition, the second influence condition and the privacy influence condition caused by a publisher of the sensitive information under the action of the information hiding object, so as to obtain a third checking result corresponding to the information to be published, and through multiple aspects of intelligent and automatic analysis, the method is beneficial to improving the analysis rate of the sensitive information in the information to be published, further is beneficial to timely obtaining the third checking result corresponding to the information to be published, thereby being beneficial to improving the management and control timeliness of the information to be published, and is beneficial to improving the analysis reliability and accuracy of the sensitive information in the information to be published, thereby being beneficial to improving the management and control reliability and accuracy of the information to be published, and realizing the safe publication and management and control of the information to be published.
Example III
Referring to fig. 3, fig. 3 is a schematic structural diagram of a control device for controlling information content security based on blockchain according to an embodiment of the present invention. As shown in fig. 3, the blockchain-based information content security management device may include:
the acquiring module 301 is configured to acquire information to be distributed that needs to be managed and controlled;
a first determining module 302, configured to determine an information parameter of information to be issued; determining a detection mode corresponding to the information to be released according to the information parameters;
the detection module 303 is configured to detect sensitive information in the information to be published according to a detection mode;
the second determining module 304 is configured to perform a matched auditing operation on the information to be published according to the information type of the sensitive information, so as to obtain an auditing result of the information to be published;
and the management and control module 305 is configured to execute corresponding management and control operations on the information to be released according to the auditing result.
In the embodiment of the invention, the information parameters of the information to be issued comprise at least one of information type parameters, information content parameters, issuing platform type parameters and issuing position parameters of the information to be issued; the detection mode comprises at least one of a text detection mode, an image detection mode, an audio detection mode, a video detection mode and a position parameter detection mode; the policing operation includes one of a permit publication operation, a block publication operation, and a withdraw publication operation.
Therefore, the management and control device based on the information content safety of the blockchain described in fig. 3 can automatically detect the sensitive information in the information to be released, and audit the information to be released aiming at the sensitive information, so as to realize automatic management and control of the information to be released, thus being beneficial to improving the audit efficiency of the information to be released, further being beneficial to improving the management and control efficiency of the information to be released, and being beneficial to timely releasing, blocking the management and control operations of the information to be released, and the like.
In an alternative embodiment, the second determining module 304 performs a matched auditing operation on the information to be published according to the information type of the sensitive information, and the manner of obtaining the auditing result of the information to be published specifically includes:
determining scene information of an information generation scene of information to be distributed, and determining scene privacy degree of the information generation scene according to the scene information of the information generation scene;
determining user information of a publisher of information to be published, and determining information publishing authority parameters of the publisher in an information generation scene according to the user information of the publisher and the scene privacy degree of the information generation scene;
and executing matched auditing operation on the information to be released according to the information release authority parameters corresponding to the publisher and the information type of the sensitive information to obtain an auditing result of the information to be released.
In this alternative embodiment, the scene information includes at least one of scene location information, scene person activity information, and scene type information.
Therefore, the management and control device based on the information content safety of the blockchain described in fig. 3 can generate scene information of a scene and user information of a publisher according to information of the information to be published to determine information publishing authority parameters corresponding to the publisher, and then combine the information publishing authority parameters corresponding to the publisher with information types of sensitive information to perform auditing operation on the information to be published, so that the information to be published can be audited in an all-around manner, and further auditing reliability and accuracy of the information to be published can be improved, and accordingly, the fact that the published information is matched with the publishing authority of the publisher and an abnormal sensitivity value of the sensitive information is still in a normal range can be ensured.
In another optional embodiment, the second determining module 304 performs a matched auditing operation on the information to be published according to the information publishing authority parameter corresponding to the publisher and the information type of the sensitive information, and the manner of obtaining the auditing result of the information to be published specifically includes:
according to the information release authority parameters corresponding to the publisher, executing release condition auditing operation on the information to be released to obtain release condition auditing results of the information to be released, and taking the results as first auditing results of the information to be released;
Judging whether the sensitive information has an information hiding object corresponding to the information type according to the information type of the sensitive information;
when judging that the sensitive information does not have an information hiding object, determining a target sensitive information comparison library matched with the information type from a plurality of preset sensitive information comparison libraries according to the information type of the sensitive information;
determining an abnormal sensitivity degree value corresponding to the sensitive information according to the target sensitive information comparison library, and taking the abnormal sensitivity degree value as a second checking result of the information to be issued;
and determining an audit result of the information to be released according to the first audit result and the second audit result.
In this alternative embodiment, the information-hiding object includes at least one of a visual information-hiding object, an auditory information-hiding object, and a location-parameter-hiding object.
Therefore, the management and control device based on the information content safety of the blockchain described in fig. 3 can directly compare the sensitive information with the target sensitive information comparison library when the sensitive information does not have the information hiding object corresponding to the information type, so as to obtain the second checking result of the information to be released, thus the flexibility of checking the sensitive information is embodied, and the reliability and accuracy of the comparison of the sensitive information are improved through the comparison operation with the sensitive information comparison library, so that the reliability and accuracy of the obtained checking result aiming at the sensitive information are improved.
In yet another alternative embodiment, the second determining module 304 performs a matched auditing operation on the information to be published according to the information publishing authority parameter corresponding to the publisher and the information type of the sensitive information, and the manner of obtaining the auditing result of the information to be published specifically further includes:
when judging that the sensitive information exists in the information hiding object, determining target parameters of the information hiding object;
according to the target parameters of the information hiding object, predicting the influence condition of the sensitive information caused by the target object corresponding to the information to be released under the information hiding object, and determining the influence degree value corresponding to the influence condition according to the influence condition to be used as a third checking result of the information to be released;
and determining an audit result of the information to be released according to the first audit result and the third audit result.
In this alternative embodiment, the target parameter of the information hiding object includes at least one of an information hiding position parameter, an information hiding area size parameter, an information hiding degree parameter, and an information hiding duration parameter of the information hiding object; the target object corresponding to the information to be published comprises a publisher or a receiver of the information to be published.
Therefore, the management and control device based on the information content safety of the blockchain described in fig. 3 can predict the influence condition of the sensitive information on the target object of the information to be issued based on the target parameter of the information hiding object under the condition that the sensitive information exists in the corresponding information hiding object, and then obtain the abnormal sensitivity degree judgment result of the information to be issued, so that the information hiding object is combined for analysis, the intellectualization and the comprehensiveness of the abnormal sensitivity degree judgment operation of the sensitive information are reflected, the reliability and the accuracy of the abnormal sensitivity degree judgment of the sensitive information are improved, and the information issuing safety of the whole information to be issued is improved.
In yet another alternative embodiment, the information type of the sensitive information includes at least one of a text information type, an image information type, an audio information type, a video information type, and a location parameter type;
the second determining module 304 predicts, according to the target parameters of the information hiding object, the influence of the sensitive information on the target object corresponding to the information to be published under the information hiding object, by specifically including:
when the information type of the sensitive information comprises at least one of a text information type, an image information type and a video information type, determining a visual information hiding condition of the sensitive information according to a target parameter of an information hiding object, and predicting a first information receiving condition of a receiver corresponding to the information to be released aiming at the sensitive information according to the visual information hiding condition;
and determining a first influence condition caused by the first information receiving condition on the receiver according to the first information receiving condition, wherein the first influence condition is used as the influence condition caused by the sensitive information to be published corresponding to the target object under the information hiding object.
In this alternative embodiment, the first information reception condition includes at least one of a first information reception amount condition, a first information reception sharpness condition, and a first information reception content condition; the first impact condition includes at least one of a first physiological impact condition, and a first activity impact condition.
Further, as an optional implementation manner, the second determining module 304 predicts, according to the target parameter of the information hiding object, an influence condition caused by the sensitive information to the target object corresponding to the released information under the information hiding object, and specifically further includes:
when the information type of the sensitive information comprises an audio information type, determining the acoustic information hiding condition of the sensitive information according to the target parameter of the information hiding object, and predicting the second information receiving condition of a receiver corresponding to the information to be released aiming at the sensitive information according to the acoustic information hiding condition;
and determining a second influence condition of the second information receiving condition on the receiver according to the second information receiving condition, wherein the second influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be released under the information hiding object.
In this alternative embodiment, the second information reception condition includes at least one of a second information reception amount condition, a second information reception sharpness condition, and a second information reception content condition; the second influence condition includes at least one of a second physiological influence condition, and a second activity influence condition.
Still further, as an optional implementation manner, the second determining module 304 predicts, according to the target parameter of the information hiding object, an influence condition caused by the sensitive information to the target object corresponding to the information to be published under the information hiding object, and specifically further includes:
when the information type of the sensitive information comprises a position parameter type, determining a position parameter hiding condition of the sensitive information according to a target parameter of an information hiding object, and predicting a position parameter receiving condition of a receiver corresponding to the information to be released aiming at the sensitive information according to the position parameter hiding condition;
according to the position parameter receiving condition, determining the position tracing condition of the publisher of the information to be published, corresponding to the information to be published, of the receiver, and according to the position tracing condition, determining the privacy influence condition of the position tracing condition on the publisher, wherein the privacy influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be published under the information hiding object.
In this alternative embodiment, the location parameter reception condition includes a location parameter reception degree condition.
Therefore, the management and control device based on the information content safety of the blockchain described in fig. 3 can analyze the determined visual information hiding condition, the auditory information hiding condition and the position parameter hiding condition of the sensitive information respectively, and then predict the first influence condition, the second influence condition and the privacy influence condition caused by the publisher of the sensitive information under the action of the information hiding object, so as to obtain the third checking result corresponding to the information to be published.
Example IV
Referring to fig. 4, fig. 4 is a schematic structural diagram of another control device for controlling information content security based on blockchain according to an embodiment of the present invention. As shown in fig. 4, the blockchain-based information content security management device may include:
a memory 401 storing executable program codes;
a processor 402 coupled with the memory 401;
the processor 402 invokes executable program code stored in the memory 401 to perform the steps in the blockchain-based information content security management method described in the first or second embodiment of the present invention.
Example five
The embodiment of the invention discloses a computer storage medium which stores computer instructions for executing the steps in the blockchain-based information content security management and control method described in the first or second embodiment of the invention when the computer instructions are called.
Example six
An embodiment of the present invention discloses a computer program product comprising a non-transitory computer readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform the steps in the blockchain-based information content security management method described in embodiment one or embodiment two.
The apparatus embodiments described above are merely illustrative, wherein the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above detailed description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product that may be stored in a computer-readable storage medium including Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) or other optical disc Memory, magnetic disc Memory, tape Memory, or any other medium that can be used for computer-readable carrying or storing data.
Finally, it should be noted that: the embodiment of the invention discloses a control method and a device for information content safety based on a blockchain, which are disclosed by the embodiment of the invention and are only used for illustrating the technical scheme of the invention, but not limiting the technical scheme; although the invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that; the technical scheme recorded in the various embodiments can be modified or part of technical features in the technical scheme can be replaced equivalently; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (10)

1. A blockchain-based information content security management and control method, the method comprising:
acquiring information to be distributed which needs to be controlled, and determining information parameters of the information to be distributed; the information parameters of the information to be distributed comprise at least one of information type parameters, information content parameters, distribution platform type parameters and distribution position parameters of the information to be distributed;
determining a detection mode corresponding to the information to be distributed according to the information parameters; the detection mode comprises at least one of a text detection mode, an image detection mode, an audio detection mode, a video detection mode and a position parameter detection mode;
Detecting sensitive information in the information to be distributed according to the detection mode, and executing matched auditing operation on the information to be distributed according to the information type of the sensitive information to obtain an auditing result of the information to be distributed;
according to the auditing result, corresponding management and control operation is executed on the information to be issued; the managing operation includes one of a permit publication operation, a block publication operation, and a withdraw publication operation.
2. The blockchain-based information content security management and control method according to claim 1, wherein the performing a matched auditing operation on the information to be distributed according to the information type of the sensitive information to obtain an auditing result of the information to be distributed includes:
determining scene information of an information generation scene of the information to be distributed, and determining scene privacy degree of the information generation scene according to the scene information of the information generation scene; the scene information comprises at least one of scene position information, scene personnel activity information and scene type information;
determining user information of a publisher of the information to be published, and determining information publishing authority parameters of the publisher in the information generating scene according to the user information of the publisher and the scene privacy degree of the information generating scene;
And according to the information release authority parameters corresponding to the publisher and the information type of the sensitive information, performing matched auditing operation on the information to be released to obtain an auditing result of the information to be released.
3. The blockchain-based information content security management and control method according to claim 2, wherein the performing a matched auditing operation on the information to be distributed according to the information distribution authority parameter corresponding to the distributor and the information type of the sensitive information to obtain an auditing result of the information to be distributed includes:
according to the information release authority parameters corresponding to the publisher, performing release condition auditing operation on the information to be released, and obtaining release condition auditing results of the information to be released as first auditing results of the information to be released;
judging whether the sensitive information has an information hiding object corresponding to the information type according to the information type of the sensitive information; the information hiding object comprises at least one of a visual information hiding object, an auditory information hiding object and a position parameter hiding object;
when judging that the sensitive information does not have the information hiding object, determining a target sensitive information comparison library matched with the information type from a plurality of preset sensitive information comparison libraries according to the information type of the sensitive information;
Determining an abnormal sensitivity degree value corresponding to the sensitive information according to the target sensitive information comparison library, and taking the abnormal sensitivity degree value as a second checking result of the information to be issued;
and determining the auditing result of the information to be distributed according to the first auditing result and the second auditing result.
4. The blockchain-based information content security management method of claim 3, further comprising:
when the sensitive information is judged to exist in the information hiding object, determining target parameters of the information hiding object; the target parameters of the information hiding object comprise at least one of an information hiding position parameter, an information hiding area size parameter, an information hiding degree parameter and an information hiding duration parameter of the information hiding object;
according to the target parameters of the information hiding object, predicting the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object, and determining the influence degree value corresponding to the influence condition according to the influence condition to be used as a third verification result of the information to be distributed; the target object corresponding to the information to be distributed comprises a distributor or a receiver of the information to be distributed;
And determining the auditing result of the information to be distributed according to the first auditing result and the third auditing result.
5. The blockchain-based information content security management method of claim 4, wherein the information type of the sensitive information includes at least one of a text information type, an image information type, an audio information type, a video information type, and a location parameter type;
and predicting the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object according to the target parameter of the information hiding object, wherein the method comprises the following steps:
when the information type of the sensitive information comprises at least one of the text information type, the image information type and the video information type, determining a visual information hiding condition of the sensitive information according to a target parameter of the information hiding object, and predicting a first information receiving condition of a receiver corresponding to the information to be sent for the sensitive information according to the visual information hiding condition; the first information receiving condition comprises at least one of a first information receiving amount condition, a first information receiving definition condition and a first information receiving content condition;
According to the first information receiving condition, determining a first influence condition of the first information receiving condition on the receiver as an influence condition of the sensitive information on a target object corresponding to the information to be distributed under the information hiding object; the first impact condition includes at least one of a first physiological impact condition, and a first activity impact condition.
6. The blockchain-based information content security management method of claim 5, further comprising:
when the information type of the sensitive information comprises the audio information type, determining the acoustic information hiding condition of the sensitive information according to the target parameter of the information hiding object, and predicting the second information receiving condition of the receiver corresponding to the information to be distributed for the sensitive information according to the acoustic information hiding condition; the second information receiving condition comprises at least one of a second information receiving amount condition, a second information receiving definition condition and a second information receiving content condition;
determining a second influence condition of the second information receiving condition on the receiver according to the second information receiving condition, wherein the second influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object; the second influence condition includes at least one of a second physiological influence condition, and a second activity influence condition.
7. The blockchain-based information content security management method of claim 5 or 6, further comprising:
when the information type of the sensitive information comprises the position parameter type, determining a position parameter hiding condition of the sensitive information according to a target parameter of the information hiding object, and predicting a position parameter receiving condition of a receiver corresponding to the information to be distributed aiming at the sensitive information according to the position parameter hiding condition; the position parameter receiving condition comprises a position parameter receiving degree condition;
and determining the position tracing condition of the receiver corresponding to the information to be distributed on the publisher of the information to be distributed according to the position parameter receiving condition, and determining the privacy influence condition caused by the position tracing condition on the publisher according to the position tracing condition, wherein the privacy influence condition is used as the influence condition of the sensitive information on the target object corresponding to the information to be distributed under the information hiding object.
8. A blockchain-based information content security management and control device, the device comprising:
the acquisition module is used for acquiring information to be distributed which needs to be controlled;
The first determining module is used for determining information parameters of the information to be distributed; the information parameters of the information to be distributed comprise at least one of information type parameters, information content parameters, distribution platform type parameters and distribution position parameters of the information to be distributed; determining a detection mode corresponding to the information to be distributed according to the information parameters; the detection mode comprises at least one of a text detection mode, an image detection mode, an audio detection mode, a video detection mode and a position parameter detection mode;
the detection module is used for detecting sensitive information in the information to be distributed according to the detection mode;
the second determining module is used for executing matched auditing operation on the information to be issued according to the information type of the sensitive information to obtain an auditing result of the information to be issued;
the management and control module is used for executing corresponding management and control operation on the information to be distributed according to the auditing result; the managing operation includes one of a permit publication operation, a block publication operation, and a withdraw publication operation.
9. A blockchain-based information content security management and control device, the device comprising:
A memory storing executable program code;
a processor coupled to the memory;
the processor invokes the executable program code stored in the memory to perform the blockchain-based information content security management method of any of claims 1-7.
10. A computer storage medium storing computer instructions which, when invoked, are operable to perform the blockchain-based information content security management method of any of claims 1-7.
CN202311507363.XA 2023-11-14 2023-11-14 Information content security management and control method and device based on block chain Active CN117235406B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311507363.XA CN117235406B (en) 2023-11-14 2023-11-14 Information content security management and control method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311507363.XA CN117235406B (en) 2023-11-14 2023-11-14 Information content security management and control method and device based on block chain

Publications (2)

Publication Number Publication Date
CN117235406A true CN117235406A (en) 2023-12-15
CN117235406B CN117235406B (en) 2024-03-19

Family

ID=89095233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311507363.XA Active CN117235406B (en) 2023-11-14 2023-11-14 Information content security management and control method and device based on block chain

Country Status (1)

Country Link
CN (1) CN117235406B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117521148A (en) * 2023-12-29 2024-02-06 苏州元脑智能科技有限公司 Information interaction method and device based on block chain, storage medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106055701A (en) * 2016-06-21 2016-10-26 武汉斗鱼网络科技有限公司 Forum content approving and publishing method and device
US20200293681A1 (en) * 2019-03-15 2020-09-17 ZenPayroll, Inc. Tagging and auditing sensitive information in a database environment
WO2022134588A1 (en) * 2020-12-21 2022-06-30 深圳壹账通智能科技有限公司 Method for constructing information review classification model, and information review method
CN114817990A (en) * 2022-05-05 2022-07-29 江苏保旺达软件技术有限公司 Sensitive data management method and device, electronic equipment and storage medium
CN116127173A (en) * 2023-04-10 2023-05-16 上海蜜度信息技术有限公司 Block chain-based network media supervision method and system, storage medium and platform
CN116340820A (en) * 2023-03-09 2023-06-27 招商银行股份有限公司 Data auditing method, device, system and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106055701A (en) * 2016-06-21 2016-10-26 武汉斗鱼网络科技有限公司 Forum content approving and publishing method and device
US20200293681A1 (en) * 2019-03-15 2020-09-17 ZenPayroll, Inc. Tagging and auditing sensitive information in a database environment
WO2022134588A1 (en) * 2020-12-21 2022-06-30 深圳壹账通智能科技有限公司 Method for constructing information review classification model, and information review method
CN114817990A (en) * 2022-05-05 2022-07-29 江苏保旺达软件技术有限公司 Sensitive data management method and device, electronic equipment and storage medium
CN116340820A (en) * 2023-03-09 2023-06-27 招商银行股份有限公司 Data auditing method, device, system and computer readable storage medium
CN116127173A (en) * 2023-04-10 2023-05-16 上海蜜度信息技术有限公司 Block chain-based network media supervision method and system, storage medium and platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴威;: "公安内网敏感信息安全监管的实现方法", 网络安全技术与应用, no. 02, pages 119 - 120 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117521148A (en) * 2023-12-29 2024-02-06 苏州元脑智能科技有限公司 Information interaction method and device based on block chain, storage medium and electronic equipment
CN117521148B (en) * 2023-12-29 2024-04-02 苏州元脑智能科技有限公司 Information interaction method and device based on block chain, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN117235406B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
CN108875688B (en) Living body detection method, device, system and storage medium
CN117235406B (en) Information content security management and control method and device based on block chain
CN113098870B (en) Phishing detection method and device, electronic equipment and storage medium
CN112417439A (en) Account detection method, device, server and storage medium
CN110602544A (en) Video display method and device, electronic equipment and storage medium
EP3130113A1 (en) Systems and methods for automated cloud-based analytics for security and/or surveillance
CN108183900B (en) Method, server, system, terminal device and storage medium for detecting mining script
CN113257255B (en) Method and device for identifying forged voice, electronic equipment and storage medium
CN113132311B (en) Abnormal access detection method, device and equipment
CN110851834B (en) Android malicious application detection method integrating multi-feature classification
CN112416730A (en) User internet behavior analysis method and device, electronic equipment and storage medium
CN109712291B (en) Opening method and device of electronic gate and server
CN110262949A (en) Smart machine log processing system and method
CN114003903A (en) Network attack tracing method and device
CN114489561A (en) Intelligent audio volume adjusting method and device, electronic equipment and storage medium
CN112217841A (en) Live broadcast room management method and device, computer equipment and storage medium
CN111221722A (en) Behavior detection method and device, electronic equipment and storage medium
CN111104685B (en) Dynamic updating method and device for two-dimension code
CN112151038B (en) Voice replay attack detection method and device, readable storage medium and electronic equipment
CN108959860A (en) Whether a kind of detection android system is cracked and cracks record acquisition methods
CN113077821A (en) Audio quality detection method and device, electronic equipment and storage medium
CN107808082A (en) Electronic installation, data access verification method and computer-readable recording medium
CN112468452B (en) Flow detection method and device, electronic equipment and computer readable storage medium
CN113516997A (en) Voice event recognition device and method
CN114091609A (en) Computer network information security event processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant